Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2023 14:35
Static task
static1
Behavioral task
behavioral1
Sample
82edbc5dd9d64f648679e486c39ec1a7adbd32b13b7ad7af21efa2608a87178e.exe
Resource
win10v2004-20231023-en
General
-
Target
82edbc5dd9d64f648679e486c39ec1a7adbd32b13b7ad7af21efa2608a87178e.exe
-
Size
1.1MB
-
MD5
127d7122e2d4550e0a7bfeb19ed0b711
-
SHA1
464458bb7f20015cbc37ca6459f680360f4ef170
-
SHA256
82edbc5dd9d64f648679e486c39ec1a7adbd32b13b7ad7af21efa2608a87178e
-
SHA512
cc785bc68d110fdd2c2a2452970cb57d2d96277e47794909e5ba3e364a4c0030f11caa4316ceed6367aa5ee72958d104f0c5f4f947c455357237ddff168bb446
-
SSDEEP
24576:LyyDG1vWvnHfIDvZF+55rfzZY2mb3OuFxpVqGJG4S/sj1PZVsEQ8q:+yDG1vwn/IbjV3OuFxpXA4SUj1PZVv/
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/636-21-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/636-22-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/636-23-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/636-27-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 9RX67zn0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 9RX67zn0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 9RX67zn0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 9RX67zn0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 9RX67zn0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 9RX67zn0.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/3888-29-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
.NET Reactor proctector 20 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/5116-51-0x00000000048C0000-0x00000000048E0000-memory.dmp net_reactor behavioral1/memory/5116-54-0x0000000004F50000-0x0000000004F6E000-memory.dmp net_reactor behavioral1/memory/5116-56-0x0000000004940000-0x0000000004950000-memory.dmp net_reactor behavioral1/memory/5116-57-0x0000000004F50000-0x0000000004F69000-memory.dmp net_reactor behavioral1/memory/5116-59-0x0000000004F50000-0x0000000004F69000-memory.dmp net_reactor behavioral1/memory/5116-62-0x0000000004F50000-0x0000000004F69000-memory.dmp net_reactor behavioral1/memory/5116-64-0x0000000004F50000-0x0000000004F69000-memory.dmp net_reactor behavioral1/memory/5116-66-0x0000000004F50000-0x0000000004F69000-memory.dmp net_reactor behavioral1/memory/5116-68-0x0000000004F50000-0x0000000004F69000-memory.dmp net_reactor behavioral1/memory/5116-70-0x0000000004F50000-0x0000000004F69000-memory.dmp net_reactor behavioral1/memory/5116-72-0x0000000004F50000-0x0000000004F69000-memory.dmp net_reactor behavioral1/memory/5116-74-0x0000000004F50000-0x0000000004F69000-memory.dmp net_reactor behavioral1/memory/5116-76-0x0000000004F50000-0x0000000004F69000-memory.dmp net_reactor behavioral1/memory/5116-78-0x0000000004F50000-0x0000000004F69000-memory.dmp net_reactor behavioral1/memory/5116-80-0x0000000004F50000-0x0000000004F69000-memory.dmp net_reactor behavioral1/memory/5116-82-0x0000000004F50000-0x0000000004F69000-memory.dmp net_reactor behavioral1/memory/5116-84-0x0000000004F50000-0x0000000004F69000-memory.dmp net_reactor behavioral1/memory/5116-86-0x0000000004F50000-0x0000000004F69000-memory.dmp net_reactor behavioral1/memory/5116-88-0x0000000004F50000-0x0000000004F69000-memory.dmp net_reactor behavioral1/memory/5116-90-0x0000000004F50000-0x0000000004F69000-memory.dmp net_reactor -
Executes dropped EXE 6 IoCs
pid Process 3648 Hi2QW00.exe 2900 OB7wV41.exe 4852 11RV3981.exe 2588 12sN384.exe 3776 13Fh325.exe 5116 9RX67zn0.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 9RX67zn0.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 9RX67zn0.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Hi2QW00.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" OB7wV41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 82edbc5dd9d64f648679e486c39ec1a7adbd32b13b7ad7af21efa2608a87178e.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4852 set thread context of 636 4852 11RV3981.exe 102 PID 2588 set thread context of 3888 2588 12sN384.exe 107 PID 3776 set thread context of 3728 3776 13Fh325.exe 118 -
Program crash 1 IoCs
pid pid_target Process procid_target 3052 636 WerFault.exe 102 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5116 9RX67zn0.exe 5116 9RX67zn0.exe 3728 AppLaunch.exe 3728 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5116 9RX67zn0.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 856 wrote to memory of 3648 856 82edbc5dd9d64f648679e486c39ec1a7adbd32b13b7ad7af21efa2608a87178e.exe 86 PID 856 wrote to memory of 3648 856 82edbc5dd9d64f648679e486c39ec1a7adbd32b13b7ad7af21efa2608a87178e.exe 86 PID 856 wrote to memory of 3648 856 82edbc5dd9d64f648679e486c39ec1a7adbd32b13b7ad7af21efa2608a87178e.exe 86 PID 3648 wrote to memory of 2900 3648 Hi2QW00.exe 88 PID 3648 wrote to memory of 2900 3648 Hi2QW00.exe 88 PID 3648 wrote to memory of 2900 3648 Hi2QW00.exe 88 PID 2900 wrote to memory of 4852 2900 OB7wV41.exe 89 PID 2900 wrote to memory of 4852 2900 OB7wV41.exe 89 PID 2900 wrote to memory of 4852 2900 OB7wV41.exe 89 PID 4852 wrote to memory of 636 4852 11RV3981.exe 102 PID 4852 wrote to memory of 636 4852 11RV3981.exe 102 PID 4852 wrote to memory of 636 4852 11RV3981.exe 102 PID 4852 wrote to memory of 636 4852 11RV3981.exe 102 PID 4852 wrote to memory of 636 4852 11RV3981.exe 102 PID 4852 wrote to memory of 636 4852 11RV3981.exe 102 PID 4852 wrote to memory of 636 4852 11RV3981.exe 102 PID 4852 wrote to memory of 636 4852 11RV3981.exe 102 PID 4852 wrote to memory of 636 4852 11RV3981.exe 102 PID 4852 wrote to memory of 636 4852 11RV3981.exe 102 PID 2900 wrote to memory of 2588 2900 OB7wV41.exe 103 PID 2900 wrote to memory of 2588 2900 OB7wV41.exe 103 PID 2900 wrote to memory of 2588 2900 OB7wV41.exe 103 PID 2588 wrote to memory of 3888 2588 12sN384.exe 107 PID 2588 wrote to memory of 3888 2588 12sN384.exe 107 PID 2588 wrote to memory of 3888 2588 12sN384.exe 107 PID 2588 wrote to memory of 3888 2588 12sN384.exe 107 PID 2588 wrote to memory of 3888 2588 12sN384.exe 107 PID 2588 wrote to memory of 3888 2588 12sN384.exe 107 PID 2588 wrote to memory of 3888 2588 12sN384.exe 107 PID 2588 wrote to memory of 3888 2588 12sN384.exe 107 PID 3648 wrote to memory of 3776 3648 Hi2QW00.exe 108 PID 3648 wrote to memory of 3776 3648 Hi2QW00.exe 108 PID 3648 wrote to memory of 3776 3648 Hi2QW00.exe 108 PID 3776 wrote to memory of 3728 3776 13Fh325.exe 118 PID 3776 wrote to memory of 3728 3776 13Fh325.exe 118 PID 3776 wrote to memory of 3728 3776 13Fh325.exe 118 PID 3776 wrote to memory of 3728 3776 13Fh325.exe 118 PID 3776 wrote to memory of 3728 3776 13Fh325.exe 118 PID 3776 wrote to memory of 3728 3776 13Fh325.exe 118 PID 3776 wrote to memory of 3728 3776 13Fh325.exe 118 PID 3776 wrote to memory of 3728 3776 13Fh325.exe 118 PID 3776 wrote to memory of 3728 3776 13Fh325.exe 118 PID 856 wrote to memory of 5116 856 82edbc5dd9d64f648679e486c39ec1a7adbd32b13b7ad7af21efa2608a87178e.exe 119 PID 856 wrote to memory of 5116 856 82edbc5dd9d64f648679e486c39ec1a7adbd32b13b7ad7af21efa2608a87178e.exe 119 PID 856 wrote to memory of 5116 856 82edbc5dd9d64f648679e486c39ec1a7adbd32b13b7ad7af21efa2608a87178e.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\82edbc5dd9d64f648679e486c39ec1a7adbd32b13b7ad7af21efa2608a87178e.exe"C:\Users\Admin\AppData\Local\Temp\82edbc5dd9d64f648679e486c39ec1a7adbd32b13b7ad7af21efa2608a87178e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Hi2QW00.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Hi2QW00.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\OB7wV41.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\OB7wV41.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\11RV3981.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\11RV3981.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 636 -s 2006⤵
- Program crash
PID:3052
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\12sN384.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\12sN384.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:3888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\13Fh325.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\13Fh325.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3728
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\9RX67zn0.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\9RX67zn0.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 636 -ip 6361⤵PID:2180
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189KB
MD5f4af3a9bb5b128ea7f4a49016ae8de1f
SHA177e47932af41b3af5bfff73d2a4c9773dc224f0d
SHA256195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1
SHA5121067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2
-
Filesize
189KB
MD5f4af3a9bb5b128ea7f4a49016ae8de1f
SHA177e47932af41b3af5bfff73d2a4c9773dc224f0d
SHA256195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1
SHA5121067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2
-
Filesize
887KB
MD5b6be02ef4564760f119a4f20ff560969
SHA171bf063b51c11abf1c9b9a0453b1b8f3c4dd3eea
SHA25634f53479ce8d660a991edc0401fe31df0a46665647f13cab94e3712ff5c36f67
SHA512ff574f84ba2b1a3a25b559a771c1696e3e2afc6cff614b90758ed075d7c2818af2a2fd68a8f429d759eebec65b245f45e54a565a08d9ff8ba8d205d09273a27f
-
Filesize
887KB
MD5b6be02ef4564760f119a4f20ff560969
SHA171bf063b51c11abf1c9b9a0453b1b8f3c4dd3eea
SHA25634f53479ce8d660a991edc0401fe31df0a46665647f13cab94e3712ff5c36f67
SHA512ff574f84ba2b1a3a25b559a771c1696e3e2afc6cff614b90758ed075d7c2818af2a2fd68a8f429d759eebec65b245f45e54a565a08d9ff8ba8d205d09273a27f
-
Filesize
717KB
MD5cd3955eecfa46053e4d2764945a4098e
SHA132d9cab47a3ea49dde458e41d5ac57746e4e78ec
SHA2561c056d943b20cd37e97030e3a9505cb58dbeccdd902427146220e4378205ec81
SHA512bd31219778cb6b1c74e9aa79df52821c501523d59d50e60d00600e01065c3c8b4eb7d9a217499d60ff3c1ce2ebf0a86cc55654a22777e88e1251bf84d63546e0
-
Filesize
717KB
MD5cd3955eecfa46053e4d2764945a4098e
SHA132d9cab47a3ea49dde458e41d5ac57746e4e78ec
SHA2561c056d943b20cd37e97030e3a9505cb58dbeccdd902427146220e4378205ec81
SHA512bd31219778cb6b1c74e9aa79df52821c501523d59d50e60d00600e01065c3c8b4eb7d9a217499d60ff3c1ce2ebf0a86cc55654a22777e88e1251bf84d63546e0
-
Filesize
426KB
MD51bc19e736f7d6f811c841ba5210371ae
SHA18956abb2ffd238b86f9ea1debadc5a921e3428af
SHA256e7d1d095f15cc29b7e8fc430e853ccb6eea752871d9060875d0d6099a0941a95
SHA512083ef8a1f1984d43657390084002a90787a3162ce1b674fed80ff48a5f3f67b22558b5ae22cccaa271d91c53055cf6802f18eef342d94b13f4e5293aab44c07f
-
Filesize
426KB
MD51bc19e736f7d6f811c841ba5210371ae
SHA18956abb2ffd238b86f9ea1debadc5a921e3428af
SHA256e7d1d095f15cc29b7e8fc430e853ccb6eea752871d9060875d0d6099a0941a95
SHA512083ef8a1f1984d43657390084002a90787a3162ce1b674fed80ff48a5f3f67b22558b5ae22cccaa271d91c53055cf6802f18eef342d94b13f4e5293aab44c07f
-
Filesize
369KB
MD51b6270ce4f03bd61360cb64e18ce3d7e
SHA194a8994c2e8712de0b067687f58de943746da97d
SHA256f0fc775842b5b6eb80c84873dbd6323bad6ae30c155a3abe48dfe323386d1231
SHA512884b4c61edd4661968d39b44f4cce99c55fb7a3d66e4366c92f2fc4500e170ecc1fa91b54d4d16c92e552c1b632fd676dc6f80f412602b03a72b10925a6ed286
-
Filesize
369KB
MD51b6270ce4f03bd61360cb64e18ce3d7e
SHA194a8994c2e8712de0b067687f58de943746da97d
SHA256f0fc775842b5b6eb80c84873dbd6323bad6ae30c155a3abe48dfe323386d1231
SHA512884b4c61edd4661968d39b44f4cce99c55fb7a3d66e4366c92f2fc4500e170ecc1fa91b54d4d16c92e552c1b632fd676dc6f80f412602b03a72b10925a6ed286
-
Filesize
408KB
MD58de6d750ad9a4d9f47b31ab4367ef0eb
SHA1f86299b4bedd0476e724ec388f1dc560a9398984
SHA25649fe01fed361a7cc5d7732a55b823666888652aead51f35240a5f51e7ebcb95e
SHA512b7cacdad03fcfa17fff85322c477562291acbaaed32afbc25ffb19a1645b6ca7670045acf1130c11269105806e6e3731c946175bafd6436c48fa93ca81e617f3
-
Filesize
408KB
MD58de6d750ad9a4d9f47b31ab4367ef0eb
SHA1f86299b4bedd0476e724ec388f1dc560a9398984
SHA25649fe01fed361a7cc5d7732a55b823666888652aead51f35240a5f51e7ebcb95e
SHA512b7cacdad03fcfa17fff85322c477562291acbaaed32afbc25ffb19a1645b6ca7670045acf1130c11269105806e6e3731c946175bafd6436c48fa93ca81e617f3